r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x7fff, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0}], 0x2800018, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mount$cgroup(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000a80)={&(0x7f0000000640)=@un=@file={0x0, 'mnt/encrypted_dir\x00'}, 0x80, &(0x7f0000000a00)=[{&(0x7f00000006c0)="1c09963e775b814f18c68a94b25b6da3bb9378477ade2cacc16885d363c85fb53311d5f480e8c14ee2905d691c86e0423fd44dfdc0f835a2a71d80dec56c3b136d51ae2ca8e2ec5e58406231b4386871ffde0da0cbbfafdadd172fa6199300a95c5e33284762d7fd09add5ed4cdbb32949ce823469f0db64e729939f53a4e7bb782e81d959e68cea03bbaa9b20b35542dfa84e213a2ed54e9838132129cf", 0x9e}, {&(0x7f0000000780)="70cd859b3583f5ff4bd2cc2d7620674ad5d9eebebc5c1fad9351dc54de25a6b496990c4671f6893377b02e03a0c2e7fc3a931bed05c9f2289259b631b339cfbaa366727f2a48b877c136688b538891d63e9997ea770889697f7a1cec2629b2b9d47cadefcea7f8516b11653c5c23d44db61eb1f86484076261949afde3f51391607da2af060657f638e78e31c6653b97b33ddf53cd9190c5110a3eb896e7dca80f78154fe5430914ebf6f984cfb5849858f740d13a3f2200a39684a824c25f63faaa83fb840bdf696e391c5d95f9e730f4321c4909917c0542dad12674334161385bfe90ae7a133dc8bf6a98f6e84ee8dd842d", 0xf3}, {&(0x7f0000000880)="cc2e4fdb14c041e4dec0632f28cbe479be1cec2192b075a7ec563d5f94c3fcdce8b5f6cbb9447b71de430c1e097225ce6056707e42e505419ded8a4985c7bd77b5142717157adf0a36c2df599751b1242dfa72f643f00f0ace4d12464e52980d30ec9fbdd127d3efdda12558cef195d98cc0037bf11945f1e48c75c76fddf99d8440f030978589cc446f895925d78b29249c3dfd6c9e563a0535c70d449c9c09df51db431861c43a39fd443e3e310bea9acee720f293604a157deb724ede7031c969c08bf448696ed28e2f966f9c528957e98b3748df15c77ef2db4124622831cc47ee419ce4bd4b2cf906e8b2", 0xed}, {&(0x7f0000000980)="730c63abf65806b67315af361cf7c5502131bda684d7d30a55a096092d102196460c9081904c28b3e3bdce04fbe77bbf56d64c933b25b01f044a8966a7f79bf9e6958be31794f8a5bbadc54087fa4d8ab58aea10d1e6cdc0", 0x58}], 0x4, &(0x7f0000000a40)=[@mark={{0x14, 0x1, 0x24, 0x8000}}], 0x18}, 0x4004055) r2 = syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='mnt/encrypted_dir\x00', 0x0, 0x15) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat(r2, &(0x7f0000000480)='./file1\x00', 0x24000, 0x23) open_by_handle_at(r3, &(0x7f0000000000)=@ceph_nfs_confh={0x10, 0x2, {0xb}}, 0x42a080) openat(r3, &(0x7f0000000240)='./mnt\x00', 0x103641, 0x101) futimesat(0xffffffffffffffff, &(0x7f0000000000)='./mnt\x00', 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000340), 0x400200, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {r0}}, './file1\x00'}) accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, 0x0) syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000300)='mnt/encrypted_dir\x00', 0x80000001, 0x2, &(0x7f0000000440)=[{&(0x7f00000003c0)="22f1f8bc114a9821530b46849e4cdce0112bee5eaff3024196086cc57005022c9d881b0d308e08a4b669f165da1744a0de08cbc165bfdeff28bc265fc0822e094b763d17", 0x44, 0x2}, {&(0x7f0000000500)="9157348b440081b835422e5b61699acee5f8b7973a71f8879f88d4e61ef02f02858aa84b76b1d1c53d63a9dae529541583ea3c980fe7e746d680780727695aa557fa4983727301df9683bae7d32ad9c66b52a2a166233cb78e8cc34c2ed1eb7ffe5add935c5eddf8a755b3d815b342f6d6102b7862a7366695db29adefcd2d5c826831e057671c5b246d632e30e35cb5ee8d65", 0x93, 0x8}], 0x10000, &(0x7f00000005c0)={[{@resuid={'resuid', 0x3d, 0xee01}}], [{@dont_hash}, {@smackfsroot}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0)